Demystifying the Secure Enclave Processor
Lyj6k4
Lyj6k4
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Attack Surface: Hardware<br />
• Memory corruption attacks again data receivers<br />
on peripheral lines<br />
▫ SPI<br />
▫ I2C<br />
▫ UART<br />
• Side Channel/Differential Power Analysis<br />
▫ Stick to <strong>the</strong> A7 (newer ones are more resistant)<br />
• Glitching<br />
▫ Standard Clock/Voltage Methods<br />
▫ O<strong>the</strong>rs